GMAIL禁止了SMTP的rc4和sslv3的支持
https://cryptosense.com/gmail-disabling-rc4-and-sslv3-smtp-support/
泄露的 Carberp KBot 源码被用于新的钓鱼广告活动中
http://phishme.com/bolek-leaked-carberp-kbot-source-code-complicit-new-phishing-campaigns/
InstaBrute:2种方式破解 Instagram 账号
https://www.arneswinnen.net/2016/05/instabrute-two-ways-to-brute-force-instagram-account-credentials/
反向工程 C++ 第一部分:函数模板和函数载入
http://www.cybersmash.io/reversing-c-pt-1-function-overloading-and-function-templates/
绕过 Device Guard执行.net代码
http://subt0x10.blogspot.tw/2016/05/to-disarm-device-guard-bring-debugger.html
Petya 和 Mischa – 勒索软件二重奏(第一部分)
https://blog.malwarebytes.org/threat-analysis/2016/05/petya-and-mischa-ransomware-duet-p1/
CoreOS Linux Alpha远程SSH安全问题描述,昨天曾推送过https://coreos.com/blog/alpha-security-incident-subset-of-users-affected.html
https://coreos.com/blog/security-brief-coreos-linux-alpha-remote-ssh-issue.html
powershell版本的autoruns,列举开机自动运行项
https://github.com/p0w3rsh3ll/AutoRuns
使用一条指令探测KMDs
http://www.anti-reversing.com/detecting-kmds-with-a-single-instruction/
一般网民的在线隐私
https://www.troyhunt.com/going-dark-online-privacy-and-anonymity-for-normal-people/
Apple OS X IOAudioFamily 缓冲区溢出导致的提权漏洞
http://www.zerodayinitiative.com/advisories/ZDI-16-347/
Apple OS X IntelAccelerator 越界索引导致的提权漏洞
http://www.zerodayinitiative.com/advisories/ZDI-16-345/
(Pwn2Own) Apple Safari TextTrack 对象UAF漏洞导致的远程代码执行
http://www.zerodayinitiative.com/advisories/ZDI-16-342/
x86 shellcode 混淆第二部分
https://breakdev.org/x86-shellcode-obfuscation-part-2/
从hackintTeam泄露的Kernel Waitery利用一直在使用
http://blog.trendmicro.com/trendlabs-security-intelligence/kernel-waiter-exploit-from-the-hacking-team-leak-still-being-used/
Defusing a binary bomb with gdb – Part 6
http://blog.carlosgaldino.com/2016/05/19/defusing-a-binary-bomb-with-gdb-part-6.html
当游戏遇到OSINT
http://www.automatingosint.com/blog/2015/07/gaming-meets-osint-her-story/
SyScan360 新加坡会议所有视频
https://www.youtube.com/playlist?list=PLKpjtdatAwijAJQZXk1piUynjIL3TYxRO
html5的webrtc,audio,battery等api可以被滥用曝光用户浏览隐私
https://webtransparency.cs.princeton.edu/webcensus/index.html#fp-results
使用windbg 捕捉rootkit
http://www.reconstructer.org/papers/Hunting%20rootkits%20with%20Windbg.pdf
客户端的战争
http://www.hackinbo.it/wp-content/uploads/2016/05/HackInBO_2016_Orru.pdf